Results 1 to 10 of about 310,612 (190)

Twitter data from the 2019–20 Australian bushfires reveals participatory and temporal variations in social media use for disaster recovery [PDF]

open access: yesScientific Reports, 2022
Social media platforms have proved to be vital sources of information to support disaster response and recovery. A key issue, though, is that social media conversation about disasters tends to tail off after the immediate disaster response phase ...
R. Ogie   +5 more
doaj   +2 more sources

Flood Recovery Outcomes and Disaster Assistance Barriers for Vulnerable Populations

open access: yesFrontiers in Water, 2021
Disaster recovery spending for major flood events in the United States is at an all-time high. Yet research examining equity in disaster assistance increasingly shows that recovery funding underserves vulnerable populations. Based on a review of academic
Bradley Wilson   +2 more
doaj   +3 more sources

Cross-domain entity identity association analysis and prediction based on representation learning

open access: yesInternational Journal of Distributed Sensor Networks, 2022
Cross-domain identity association of network entities is a significant research challenge and a vital issue of practical value in relationship discovery and service recommendation between things in the Internet of things, cyberspace resources surveying ...
Mingcheng Gao   +4 more
doaj   +1 more source

CDSTAEP: Cross-Domain Spatial-Temporal Association Learning for Abnormal Events Prediction

open access: yesApplied Sciences, 2023
Predicting network abnormal events and behavior can enhance security situation awareness and the ability to infer attack intentions. Most of the existing abnormal event prediction methods usually rely on the temporal relationship features between events ...
Mingcheng Gao   +3 more
doaj   +1 more source

Crisis hazard assessment for snow-related lahars from an unforeseen new vent eruption: the 2018 eruption of Kusatsu-Shirane volcano, Japan

open access: yesEarth, Planets and Space, 2021
Two-thirds of the 111 active volcanoes in Japan are covered with snow for several months during winter and demonstrate high hazard and risk potentials associated with snow-related lahars during and after eruptions.
Kyoko S. Kataoka   +4 more
doaj   +1 more source

Opportunistic disaster recovery [PDF]

open access: yesInternet Technology Letters, 2018
Disaster scenarios require different recovery solutions such as evacuation guidance, to perform the right action for wounded persons and efficiency diffuse useful alert for locating trapped survivors. These latter are constrained mainly by the infrastructure‐less environment caused by the disaster damage (e.g. storm, earthquake).
Farouk Mezghani, Nathalie Mitton
openaire   +1 more source

GLPS: A Geohash-Based Location Privacy Protection Scheme

open access: yesEntropy, 2023
With the development of mobile applications, location-based services (LBSs) have been incorporated into people’s daily lives and created huge commercial revenues.
Bin Liu   +3 more
doaj   +1 more source

Network planning for disaster recovery [PDF]

open access: yes2008 16th IEEE Workshop on Local and Metropolitan Area Networks, 2008
Disaster recovery and business continuity issues are becoming fundamental in networks since the importance and social value of digital data is continuously increasing. On the one hand, there is an obvious need of backing up data for resilience against major failures; in many situations the process of storing backup data is also enforced by the law.
BIANCO, ANDREA   +4 more
openaire   +1 more source

User Identity Linkage Across Social Networks by Heterogeneous Graph Attention Network Modeling

open access: yesApplied Sciences, 2020
Today, social networks are becoming increasingly popular and indispensable, where users usually have multiple accounts. It is of considerable significance to conduct user identity linkage across social networks.
Ruiheng Wang   +5 more
doaj   +1 more source

Using User Behavior to Measure Privacy on Online Social Networks

open access: yesIEEE Access, 2020
Because social networks exemplify the phenomenon of homogeneity in complex networks, researchers generally believe that a user's privacy disclosure is closely related to that of the users around them, but we find that the related users studied in ...
Xuefeng Li   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy